diff --git a/policy-rawhide-base.patch b/policy-rawhide-base.patch index 5cb6337..3ca93a0 100644 --- a/policy-rawhide-base.patch +++ b/policy-rawhide-base.patch @@ -26309,7 +26309,7 @@ index 0000000..310ea6d \ No newline at end of file diff --git a/man/man8/condor_collector_selinux.8 b/man/man8/condor_collector_selinux.8 new file mode 100644 -index 0000000..b0807ef +index 0000000..b0807efa --- /dev/null +++ b/man/man8/condor_collector_selinux.8 @@ -0,0 +1,261 @@ @@ -228517,8 +228517,43 @@ index dd3be8d..aab0c5a 100644 + allow daemon direct_run_init:process sigchld; + allow direct_run_init direct_init_entry:file { getattr open read execute }; +') +diff --git a/policy/modules/system/ipsec.fc b/policy/modules/system/ipsec.fc +index 662e79b..a452892 100644 +--- a/policy/modules/system/ipsec.fc ++++ b/policy/modules/system/ipsec.fc +@@ -1,6 +1,8 @@ + /etc/rc\.d/init\.d/ipsec -- gen_context(system_u:object_r:ipsec_initrc_exec_t,s0) + /etc/rc\.d/init\.d/racoon -- gen_context(system_u:object_r:ipsec_initrc_exec_t,s0) + ++/usr/lib/systemd/system/strongswan.* -- gen_context(system_u:object_r:ipsec_mgmt_unit_file_t,s0) ++ + /etc/ipsec\.secrets -- gen_context(system_u:object_r:ipsec_key_file_t,s0) + /etc/ipsec\.conf -- gen_context(system_u:object_r:ipsec_conf_file_t,s0) + /etc/racoon/psk\.txt -- gen_context(system_u:object_r:ipsec_key_file_t,s0) +@@ -8,6 +10,8 @@ + /etc/racoon(/.*)? gen_context(system_u:object_r:ipsec_conf_file_t,s0) + /etc/racoon/certs(/.*)? gen_context(system_u:object_r:ipsec_key_file_t,s0) + ++/etc/strongswan(/.*)? gen_context(system_u:object_r:ipsec_conf_file_t,s0) ++ + /etc/ipsec\.d(/.*)? gen_context(system_u:object_r:ipsec_key_file_t,s0) + + /sbin/setkey -- gen_context(system_u:object_r:setkey_exec_t,s0) +@@ -26,10 +30,12 @@ + /usr/libexec/ipsec/pluto -- gen_context(system_u:object_r:ipsec_exec_t,s0) + /usr/libexec/ipsec/spi -- gen_context(system_u:object_r:ipsec_exec_t,s0) + /usr/libexec/nm-openswan-service -- gen_context(system_u:object_r:ipsec_mgmt_exec_t,s0) ++/usr/libexec/strongswan -- gen_context(system_u:object_r:ipsec_mgmt_exec_t,s0) + + /usr/sbin/ipsec -- gen_context(system_u:object_r:ipsec_mgmt_exec_t,s0) + /usr/sbin/racoon -- gen_context(system_u:object_r:racoon_exec_t,s0) + /usr/sbin/setkey -- gen_context(system_u:object_r:setkey_exec_t,s0) ++/usr/sbin/strongswan -- gen_context(system_u:object_r:ipsec_mgmt_exec_t,s0) + + /var/lock/subsys/ipsec -- gen_context(system_u:object_r:ipsec_mgmt_lock_t,s0) + diff --git a/policy/modules/system/ipsec.if b/policy/modules/system/ipsec.if -index 0d4c8d3..9d66bf7 100644 +index 0d4c8d3..ac0a652 100644 --- a/policy/modules/system/ipsec.if +++ b/policy/modules/system/ipsec.if @@ -120,7 +120,6 @@ interface(`ipsec_exec_mgmt',` @@ -228553,11 +228588,48 @@ index 0d4c8d3..9d66bf7 100644 ') ######################################## +@@ -369,3 +367,26 @@ interface(`ipsec_run_setkey',` + ipsec_domtrans_setkey($1) + role $2 types setkey_t; + ') ++ ++####################################### ++## ++## Execute strongswan in the ipsec_mgmt domain. ++## ++## ++## ++## Domain allowed to transition. ++## ++## ++# ++interface(`ipsec_mgmt_systemctl',` ++ gen_require(` ++ type ipsec_mgmt_unit_file_t; ++ type ipsec_mgmt_t; ++ ') ++ ++ systemd_exec_systemctl($1) ++ allow $1 ipsec_mgmt_unit_file_t:file read_file_perms; ++ allow $1 ipsec_mgmt_unit_file_t:service manage_service_perms; ++ ++ ps_process_pattern($1, ipsec_mgmt_t) ++') diff --git a/policy/modules/system/ipsec.te b/policy/modules/system/ipsec.te -index 9e54bf9..ed744d2 100644 +index 9e54bf9..35992c7 100644 --- a/policy/modules/system/ipsec.te +++ b/policy/modules/system/ipsec.te -@@ -73,13 +73,15 @@ role system_r types setkey_t; +@@ -48,6 +48,9 @@ init_system_domain(ipsec_mgmt_t, ipsec_mgmt_exec_t) + corecmd_shell_entry_type(ipsec_mgmt_t) + role system_r types ipsec_mgmt_t; + ++type ipsec_mgmt_unit_file_t; ++systemd_unit_file(ipsec_mgmt_unit_file_t) ++ + type ipsec_mgmt_lock_t; + files_lock_file(ipsec_mgmt_lock_t) + +@@ -73,13 +76,15 @@ role system_r types setkey_t; # allow ipsec_t self:capability { net_admin dac_override dac_read_search setpcap sys_nice }; @@ -228574,7 +228646,7 @@ index 9e54bf9..ed744d2 100644 allow ipsec_t ipsec_initrc_exec_t:file read_file_perms; -@@ -128,20 +130,21 @@ corecmd_exec_shell(ipsec_t) +@@ -128,20 +133,21 @@ corecmd_exec_shell(ipsec_t) corecmd_exec_bin(ipsec_t) # Pluto needs network access @@ -228603,7 +228675,7 @@ index 9e54bf9..ed744d2 100644 dev_read_sysfs(ipsec_t) dev_read_rand(ipsec_t) -@@ -157,6 +160,8 @@ files_dontaudit_search_home(ipsec_t) +@@ -157,6 +163,8 @@ files_dontaudit_search_home(ipsec_t) fs_getattr_all_fs(ipsec_t) fs_search_auto_mountpoints(ipsec_t) @@ -228612,7 +228684,7 @@ index 9e54bf9..ed744d2 100644 term_use_console(ipsec_t) term_dontaudit_use_all_ttys(ipsec_t) -@@ -165,11 +170,13 @@ auth_use_nsswitch(ipsec_t) +@@ -165,11 +173,13 @@ auth_use_nsswitch(ipsec_t) init_use_fds(ipsec_t) init_use_script_ptys(ipsec_t) @@ -228627,7 +228699,7 @@ index 9e54bf9..ed744d2 100644 userdom_dontaudit_use_unpriv_user_fds(ipsec_t) userdom_dontaudit_search_user_home_dirs(ipsec_t) -@@ -187,9 +194,9 @@ optional_policy(` +@@ -187,9 +197,9 @@ optional_policy(` # ipsec_mgmt Local policy # @@ -228640,7 +228712,7 @@ index 9e54bf9..ed744d2 100644 allow ipsec_mgmt_t self:unix_stream_socket create_stream_socket_perms; allow ipsec_mgmt_t self:tcp_socket create_stream_socket_perms; allow ipsec_mgmt_t self:udp_socket create_socket_perms; -@@ -246,6 +253,16 @@ kernel_read_kernel_sysctls(ipsec_mgmt_t) +@@ -246,6 +256,16 @@ kernel_read_kernel_sysctls(ipsec_mgmt_t) kernel_getattr_core_if(ipsec_mgmt_t) kernel_getattr_message_if(ipsec_mgmt_t) @@ -228657,7 +228729,7 @@ index 9e54bf9..ed744d2 100644 files_read_kernel_symbol_table(ipsec_mgmt_t) files_getattr_kernel_modules(ipsec_mgmt_t) -@@ -255,6 +272,8 @@ files_getattr_kernel_modules(ipsec_mgmt_t) +@@ -255,6 +275,8 @@ files_getattr_kernel_modules(ipsec_mgmt_t) corecmd_exec_bin(ipsec_mgmt_t) corecmd_exec_shell(ipsec_mgmt_t) @@ -228666,7 +228738,7 @@ index 9e54bf9..ed744d2 100644 dev_read_rand(ipsec_mgmt_t) dev_read_urand(ipsec_mgmt_t) -@@ -278,9 +297,10 @@ fs_getattr_xattr_fs(ipsec_mgmt_t) +@@ -278,9 +300,10 @@ fs_getattr_xattr_fs(ipsec_mgmt_t) fs_list_tmpfs(ipsec_mgmt_t) term_use_console(ipsec_mgmt_t) @@ -228678,7 +228750,7 @@ index 9e54bf9..ed744d2 100644 init_read_utmp(ipsec_mgmt_t) init_use_script_ptys(ipsec_mgmt_t) -@@ -290,15 +310,16 @@ init_labeled_script_domtrans(ipsec_mgmt_t, ipsec_initrc_exec_t) +@@ -290,15 +313,16 @@ init_labeled_script_domtrans(ipsec_mgmt_t, ipsec_initrc_exec_t) logging_send_syslog_msg(ipsec_mgmt_t) @@ -228700,7 +228772,7 @@ index 9e54bf9..ed744d2 100644 optional_policy(` consoletype_exec(ipsec_mgmt_t) -@@ -370,13 +391,12 @@ kernel_request_load_module(racoon_t) +@@ -370,13 +394,12 @@ kernel_request_load_module(racoon_t) corecmd_exec_shell(racoon_t) corecmd_exec_bin(racoon_t) @@ -228720,7 +228792,7 @@ index 9e54bf9..ed744d2 100644 corenet_udp_bind_isakmp_port(racoon_t) corenet_udp_bind_ipsecnat_port(racoon_t) -@@ -401,10 +421,11 @@ locallogin_use_fds(racoon_t) +@@ -401,10 +424,11 @@ locallogin_use_fds(racoon_t) logging_send_syslog_msg(racoon_t) logging_send_audit_msgs(racoon_t) @@ -228733,7 +228805,7 @@ index 9e54bf9..ed744d2 100644 auth_can_read_shadow_passwords(racoon_t) tunable_policy(`racoon_read_shadow',` auth_tunable_read_shadow(racoon_t) -@@ -438,9 +459,9 @@ corenet_setcontext_all_spds(setkey_t) +@@ -438,9 +462,9 @@ corenet_setcontext_all_spds(setkey_t) locallogin_use_fds(setkey_t) @@ -228935,7 +229007,7 @@ index 5dfa44b..938e2ec 100644 optional_policy(` diff --git a/policy/modules/system/libraries.fc b/policy/modules/system/libraries.fc -index 73bb3c0..bd25d6e 100644 +index 73bb3c0..e96fdf3 100644 --- a/policy/modules/system/libraries.fc +++ b/policy/modules/system/libraries.fc @@ -1,3 +1,4 @@ @@ -229048,11 +229120,12 @@ index 73bb3c0..bd25d6e 100644 /usr/lib/libfglrx_gamma\.so.* -- gen_context(system_u:object_r:textrel_shlib_t,s0) /usr/lib/mozilla/plugins/nppdf\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0) /usr/lib/mozilla/plugins/libvlcplugin\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0) -@@ -241,13 +254,10 @@ HOME_DIR/.*/plugins/nppdf\.so.* -- gen_context(system_u:object_r:textrel_shlib_ +@@ -241,13 +254,11 @@ HOME_DIR/.*/plugins/nppdf\.so.* -- gen_context(system_u:object_r:textrel_shlib_ # Livna.org packages: xmms-mp3, ffmpeg, xvidcore, xine-lib, gsm, lame /usr/lib.*/libmpg123\.so(\.[^/]*)* -- gen_context(system_u:object_r:textrel_shlib_t,s0) -/usr/local(/.*)?/libmpg123\.so(\.[^/]*)* -- gen_context(system_u:object_r:textrel_shlib_t,s0) ++/usr/lib/libmpg123\.so(\.[^/]*)* -- gen_context(system_u:object_r:textrel_shlib_t,s0) +/usr/libmpg123\.so(\.[^/]*)* -- gen_context(system_u:object_r:textrel_shlib_t,s0) /usr/lib/codecs/drv[1-9c]\.so(\.[^/]*)* -- gen_context(system_u:object_r:textrel_shlib_t,s0) @@ -229063,7 +229136,7 @@ index 73bb3c0..bd25d6e 100644 # Jai, Sun Microsystems (Jpackage SPRM) /usr/lib/libmlib_jai\.so -- gen_context(system_u:object_r:textrel_shlib_t,s0) -@@ -269,20 +279,19 @@ HOME_DIR/.mozilla/plugins/nprhapengine\.so.* -- gen_context(system_u:object_r:te +@@ -269,20 +280,19 @@ HOME_DIR/.mozilla/plugins/nprhapengine\.so.* -- gen_context(system_u:object_r:te # Java, Sun Microsystems (JPackage SRPM) /usr/(.*/)?jre.*/.*\.so(\.[^/]*)* -- gen_context(system_u:object_r:textrel_shlib_t,s0) @@ -229094,7 +229167,7 @@ index 73bb3c0..bd25d6e 100644 /usr/(.*/)?intellinux/SPPlugins/ADMPlugin\.apl -- gen_context(system_u:object_r:textrel_shlib_t,s0) -@@ -299,17 +308,151 @@ HOME_DIR/.mozilla/plugins/nprhapengine\.so.* -- gen_context(system_u:object_r:te +@@ -299,17 +309,151 @@ HOME_DIR/.mozilla/plugins/nprhapengine\.so.* -- gen_context(system_u:object_r:te # /var/cache/ldconfig(/.*)? gen_context(system_u:object_r:ldconfig_cache_t,s0) @@ -237659,7 +237732,7 @@ index db75976..65191bd 100644 + +/var/run/user(/.*)? gen_context(system_u:object_r:user_tmp_t,s0) diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if -index 3c5dba7..0bb7b4d 100644 +index 3c5dba7..f2fe86e 100644 --- a/policy/modules/system/userdomain.if +++ b/policy/modules/system/userdomain.if @@ -30,9 +30,11 @@ template(`userdom_base_user_template',` @@ -237675,7 +237748,7 @@ index 3c5dba7..0bb7b4d 100644 corecmd_shell_entry_type($1_t) corecmd_bin_entry_type($1_t) domain_user_exemption_target($1_t) -@@ -44,79 +46,131 @@ template(`userdom_base_user_template',` +@@ -44,79 +46,132 @@ template(`userdom_base_user_template',` term_user_pty($1_t, user_devpts_t) term_user_tty($1_t, user_tty_device_t) @@ -237831,6 +237904,7 @@ index 3c5dba7..0bb7b4d 100644 + systemd_read_logind_sessions_files($1_usertype) + systemd_write_inhibit_pipes($1_usertype) + systemd_write_inherited_logind_sessions_pipes($1_usertype) ++ systemd_login_read_pid_files($1_usertype) + + tunable_policy(`deny_execmem',`', ` # Allow loading DSOs that require executable stack. @@ -237859,7 +237933,7 @@ index 3c5dba7..0bb7b4d 100644 ') ####################################### -@@ -150,6 +204,8 @@ interface(`userdom_ro_home_role',` +@@ -150,6 +205,8 @@ interface(`userdom_ro_home_role',` type user_home_t, user_home_dir_t; ') @@ -237868,7 +237942,7 @@ index 3c5dba7..0bb7b4d 100644 ############################## # # Domain access to home dir -@@ -167,27 +223,6 @@ interface(`userdom_ro_home_role',` +@@ -167,27 +224,6 @@ interface(`userdom_ro_home_role',` read_sock_files_pattern($2, { user_home_t user_home_dir_t }, user_home_t) files_list_home($2) @@ -237896,7 +237970,7 @@ index 3c5dba7..0bb7b4d 100644 ') ####################################### -@@ -219,8 +254,11 @@ interface(`userdom_ro_home_role',` +@@ -219,8 +255,11 @@ interface(`userdom_ro_home_role',` interface(`userdom_manage_home_role',` gen_require(` type user_home_t, user_home_dir_t; @@ -237908,7 +237982,7 @@ index 3c5dba7..0bb7b4d 100644 ############################## # # Domain access to home dir -@@ -229,43 +267,47 @@ interface(`userdom_manage_home_role',` +@@ -229,43 +268,47 @@ interface(`userdom_manage_home_role',` type_member $2 user_home_dir_t:dir user_home_dir_t; # full control of the home directory @@ -237972,7 +238046,7 @@ index 3c5dba7..0bb7b4d 100644 ') ') -@@ -273,6 +315,25 @@ interface(`userdom_manage_home_role',` +@@ -273,6 +316,25 @@ interface(`userdom_manage_home_role',` ## ## Manage user temporary files ## @@ -237998,7 +238072,7 @@ index 3c5dba7..0bb7b4d 100644 ## ## ## Role allowed access. -@@ -287,17 +348,64 @@ interface(`userdom_manage_home_role',` +@@ -287,17 +349,64 @@ interface(`userdom_manage_home_role',` # interface(`userdom_manage_tmp_role',` gen_require(` @@ -238068,7 +238142,7 @@ index 3c5dba7..0bb7b4d 100644 ') ####################################### -@@ -317,11 +425,31 @@ interface(`userdom_exec_user_tmp_files',` +@@ -317,11 +426,31 @@ interface(`userdom_exec_user_tmp_files',` ') exec_files_pattern($1, user_tmp_t, user_tmp_t) @@ -238100,7 +238174,7 @@ index 3c5dba7..0bb7b4d 100644 ## Role access for the user tmpfs type ## that the user has full access. ## -@@ -348,59 +476,60 @@ interface(`userdom_exec_user_tmp_files',` +@@ -348,59 +477,60 @@ interface(`userdom_exec_user_tmp_files',` # interface(`userdom_manage_tmpfs_role',` gen_require(` @@ -238191,7 +238265,7 @@ index 3c5dba7..0bb7b4d 100644 ') ####################################### -@@ -431,6 +560,7 @@ template(`userdom_xwindows_client_template',` +@@ -431,6 +561,7 @@ template(`userdom_xwindows_client_template',` dev_dontaudit_rw_dri($1_t) # GNOME checks for usb and other devices: dev_rw_usbfs($1_t) @@ -238199,7 +238273,7 @@ index 3c5dba7..0bb7b4d 100644 xserver_user_x_domain_template($1, $1_t, user_tmpfs_t) xserver_xsession_entry_type($1_t) -@@ -463,8 +593,8 @@ template(`userdom_change_password_template',` +@@ -463,8 +594,8 @@ template(`userdom_change_password_template',` ') optional_policy(` @@ -238210,7 +238284,7 @@ index 3c5dba7..0bb7b4d 100644 ') ') -@@ -491,7 +621,8 @@ template(`userdom_common_user_template',` +@@ -491,7 +622,8 @@ template(`userdom_common_user_template',` attribute unpriv_userdomain; ') @@ -238220,7 +238294,7 @@ index 3c5dba7..0bb7b4d 100644 ############################## # -@@ -501,41 +632,51 @@ template(`userdom_common_user_template',` +@@ -501,41 +633,51 @@ template(`userdom_common_user_template',` # evolution and gnome-session try to create a netlink socket dontaudit $1_t self:netlink_socket { create ioctl read getattr write setattr append bind connect getopt setopt shutdown }; dontaudit $1_t self:netlink_route_socket { create ioctl read getattr write setattr append bind connect getopt setopt shutdown nlmsg_read nlmsg_write }; @@ -238295,7 +238369,7 @@ index 3c5dba7..0bb7b4d 100644 # cjp: some of this probably can be removed selinux_get_fs_mount($1_t) -@@ -546,93 +687,121 @@ template(`userdom_common_user_template',` +@@ -546,93 +688,121 @@ template(`userdom_common_user_template',` selinux_compute_user_contexts($1_t) # for eject @@ -238455,7 +238529,7 @@ index 3c5dba7..0bb7b4d 100644 ') optional_policy(` -@@ -646,19 +815,17 @@ template(`userdom_common_user_template',` +@@ -646,19 +816,17 @@ template(`userdom_common_user_template',` # for running depmod as part of the kernel packaging process optional_policy(` @@ -238480,7 +238554,7 @@ index 3c5dba7..0bb7b4d 100644 mysql_stream_connect($1_t) ') ') -@@ -671,7 +838,7 @@ template(`userdom_common_user_template',` +@@ -671,7 +839,7 @@ template(`userdom_common_user_template',` optional_policy(` # to allow monitoring of pcmcia status @@ -238489,7 +238563,7 @@ index 3c5dba7..0bb7b4d 100644 ') optional_policy(` -@@ -680,9 +847,9 @@ template(`userdom_common_user_template',` +@@ -680,9 +848,9 @@ template(`userdom_common_user_template',` ') optional_policy(` @@ -238502,7 +238576,7 @@ index 3c5dba7..0bb7b4d 100644 ') ') -@@ -693,32 +860,36 @@ template(`userdom_common_user_template',` +@@ -693,32 +861,36 @@ template(`userdom_common_user_template',` ') optional_policy(` @@ -238550,7 +238624,7 @@ index 3c5dba7..0bb7b4d 100644 ') ') -@@ -743,17 +914,33 @@ template(`userdom_common_user_template',` +@@ -743,17 +915,33 @@ template(`userdom_common_user_template',` template(`userdom_login_user_template', ` gen_require(` class context contains; @@ -238589,7 +238663,7 @@ index 3c5dba7..0bb7b4d 100644 userdom_change_password_template($1) -@@ -761,82 +948,100 @@ template(`userdom_login_user_template', ` +@@ -761,82 +949,100 @@ template(`userdom_login_user_template', ` # # User domain Local policy # @@ -238726,7 +238800,7 @@ index 3c5dba7..0bb7b4d 100644 ') ') -@@ -868,6 +1073,12 @@ template(`userdom_restricted_user_template',` +@@ -868,6 +1074,12 @@ template(`userdom_restricted_user_template',` typeattribute $1_t unpriv_userdomain; domain_interactive_fd($1_t) @@ -238739,7 +238813,7 @@ index 3c5dba7..0bb7b4d 100644 ############################## # # Local policy -@@ -908,41 +1119,91 @@ template(`userdom_restricted_xwindows_user_template',` +@@ -908,41 +1120,91 @@ template(`userdom_restricted_xwindows_user_template',` # Local policy # @@ -238844,7 +238918,7 @@ index 3c5dba7..0bb7b4d 100644 ') optional_policy(` -@@ -951,12 +1212,26 @@ template(`userdom_restricted_xwindows_user_template',` +@@ -951,12 +1213,26 @@ template(`userdom_restricted_xwindows_user_template',` ') optional_policy(` @@ -238872,7 +238946,7 @@ index 3c5dba7..0bb7b4d 100644 ') ####################################### -@@ -990,27 +1265,33 @@ template(`userdom_unpriv_user_template', ` +@@ -990,27 +1266,33 @@ template(`userdom_unpriv_user_template', ` # # Inherit rules for ordinary users. @@ -238910,7 +238984,7 @@ index 3c5dba7..0bb7b4d 100644 fs_manage_noxattr_fs_files($1_t) fs_manage_noxattr_fs_dirs($1_t) # Write floppies -@@ -1021,23 +1302,57 @@ template(`userdom_unpriv_user_template', ` +@@ -1021,23 +1303,57 @@ template(`userdom_unpriv_user_template', ` ') ') @@ -238978,7 +239052,7 @@ index 3c5dba7..0bb7b4d 100644 ') # Run pppd in pppd_t by default for user -@@ -1046,7 +1361,9 @@ template(`userdom_unpriv_user_template', ` +@@ -1046,7 +1362,9 @@ template(`userdom_unpriv_user_template', ` ') optional_policy(` @@ -238989,7 +239063,7 @@ index 3c5dba7..0bb7b4d 100644 ') ') -@@ -1082,7 +1399,7 @@ template(`userdom_unpriv_user_template', ` +@@ -1082,7 +1400,7 @@ template(`userdom_unpriv_user_template', ` template(`userdom_admin_user_template',` gen_require(` attribute admindomain; @@ -238998,7 +239072,7 @@ index 3c5dba7..0bb7b4d 100644 ') ############################## -@@ -1109,6 +1426,7 @@ template(`userdom_admin_user_template',` +@@ -1109,6 +1427,7 @@ template(`userdom_admin_user_template',` # allow $1_t self:capability ~{ sys_module audit_control audit_write }; @@ -239006,7 +239080,7 @@ index 3c5dba7..0bb7b4d 100644 allow $1_t self:process { setexec setfscreate }; allow $1_t self:netlink_audit_socket nlmsg_readpriv; allow $1_t self:tun_socket create; -@@ -1117,6 +1435,9 @@ template(`userdom_admin_user_template',` +@@ -1117,6 +1436,9 @@ template(`userdom_admin_user_template',` # Skip authentication when pam_rootok is specified. allow $1_t self:passwd rootok; @@ -239016,7 +239090,7 @@ index 3c5dba7..0bb7b4d 100644 kernel_read_software_raid_state($1_t) kernel_getattr_core_if($1_t) kernel_getattr_message_if($1_t) -@@ -1131,6 +1452,7 @@ template(`userdom_admin_user_template',` +@@ -1131,6 +1453,7 @@ template(`userdom_admin_user_template',` kernel_sigstop_unlabeled($1_t) kernel_signull_unlabeled($1_t) kernel_sigchld_unlabeled($1_t) @@ -239024,7 +239098,7 @@ index 3c5dba7..0bb7b4d 100644 corenet_tcp_bind_generic_port($1_t) # allow setting up tunnels -@@ -1148,10 +1470,14 @@ template(`userdom_admin_user_template',` +@@ -1148,10 +1471,14 @@ template(`userdom_admin_user_template',` dev_rename_all_blk_files($1_t) dev_rename_all_chr_files($1_t) dev_create_generic_symlinks($1_t) @@ -239039,7 +239113,7 @@ index 3c5dba7..0bb7b4d 100644 domain_dontaudit_ptrace_all_domains($1_t) # signal all domains: domain_kill_all_domains($1_t) -@@ -1162,29 +1488,38 @@ template(`userdom_admin_user_template',` +@@ -1162,29 +1489,38 @@ template(`userdom_admin_user_template',` domain_sigchld_all_domains($1_t) # for lsof domain_getattr_all_sockets($1_t) @@ -239082,7 +239156,7 @@ index 3c5dba7..0bb7b4d 100644 # The following rule is temporary until such time that a complete # policy management infrastructure is in place so that an administrator -@@ -1194,6 +1529,8 @@ template(`userdom_admin_user_template',` +@@ -1194,6 +1530,8 @@ template(`userdom_admin_user_template',` # But presently necessary for installing the file_contexts file. seutil_manage_bin_policy($1_t) @@ -239091,7 +239165,7 @@ index 3c5dba7..0bb7b4d 100644 userdom_manage_user_home_content_dirs($1_t) userdom_manage_user_home_content_files($1_t) userdom_manage_user_home_content_symlinks($1_t) -@@ -1201,13 +1538,17 @@ template(`userdom_admin_user_template',` +@@ -1201,13 +1539,17 @@ template(`userdom_admin_user_template',` userdom_manage_user_home_content_sockets($1_t) userdom_user_home_dir_filetrans_user_home_content($1_t, { dir file lnk_file fifo_file sock_file }) @@ -239110,7 +239184,7 @@ index 3c5dba7..0bb7b4d 100644 optional_policy(` postgresql_unconfined($1_t) ') -@@ -1253,6 +1594,8 @@ template(`userdom_security_admin_template',` +@@ -1253,6 +1595,8 @@ template(`userdom_security_admin_template',` dev_relabel_all_dev_nodes($1) files_create_boot_flag($1) @@ -239119,7 +239193,7 @@ index 3c5dba7..0bb7b4d 100644 # Necessary for managing /boot/efi fs_manage_dos_files($1) -@@ -1265,8 +1608,10 @@ template(`userdom_security_admin_template',` +@@ -1265,8 +1609,10 @@ template(`userdom_security_admin_template',` selinux_set_enforce_mode($1) selinux_set_all_booleans($1) selinux_set_parameters($1) @@ -239131,7 +239205,7 @@ index 3c5dba7..0bb7b4d 100644 auth_relabel_shadow($1) init_exec($1) -@@ -1277,35 +1622,37 @@ template(`userdom_security_admin_template',` +@@ -1277,35 +1623,37 @@ template(`userdom_security_admin_template',` logging_read_audit_config($1) seutil_manage_bin_policy($1) @@ -239182,7 +239256,7 @@ index 3c5dba7..0bb7b4d 100644 ######################################## ## -@@ -1360,14 +1707,17 @@ interface(`userdom_user_home_content',` +@@ -1360,14 +1708,17 @@ interface(`userdom_user_home_content',` gen_require(` attribute user_home_content_type; type user_home_t; @@ -239201,7 +239275,7 @@ index 3c5dba7..0bb7b4d 100644 ') ######################################## -@@ -1408,6 +1758,51 @@ interface(`userdom_user_tmpfs_file',` +@@ -1408,6 +1759,51 @@ interface(`userdom_user_tmpfs_file',` ## ## Allow domain to attach to TUN devices created by administrative users. ## @@ -239253,7 +239327,7 @@ index 3c5dba7..0bb7b4d 100644 ## ## ## Domain allowed access. -@@ -1512,11 +1907,31 @@ interface(`userdom_search_user_home_dirs',` +@@ -1512,11 +1908,31 @@ interface(`userdom_search_user_home_dirs',` ') allow $1 user_home_dir_t:dir search_dir_perms; @@ -239285,7 +239359,7 @@ index 3c5dba7..0bb7b4d 100644 ## Do not audit attempts to search user home directories. ## ## -@@ -1558,6 +1973,14 @@ interface(`userdom_list_user_home_dirs',` +@@ -1558,6 +1974,14 @@ interface(`userdom_list_user_home_dirs',` allow $1 user_home_dir_t:dir list_dir_perms; files_search_home($1) @@ -239300,7 +239374,7 @@ index 3c5dba7..0bb7b4d 100644 ') ######################################## -@@ -1573,9 +1996,11 @@ interface(`userdom_list_user_home_dirs',` +@@ -1573,9 +1997,11 @@ interface(`userdom_list_user_home_dirs',` interface(`userdom_dontaudit_list_user_home_dirs',` gen_require(` type user_home_dir_t; @@ -239312,7 +239386,7 @@ index 3c5dba7..0bb7b4d 100644 ') ######################################## -@@ -1632,6 +2057,42 @@ interface(`userdom_relabelto_user_home_dirs',` +@@ -1632,6 +2058,42 @@ interface(`userdom_relabelto_user_home_dirs',` allow $1 user_home_dir_t:dir relabelto; ') @@ -239355,7 +239429,7 @@ index 3c5dba7..0bb7b4d 100644 ######################################## ## ## Create directories in the home dir root with -@@ -1711,6 +2172,8 @@ interface(`userdom_dontaudit_search_user_home_content',` +@@ -1711,6 +2173,8 @@ interface(`userdom_dontaudit_search_user_home_content',` ') dontaudit $1 user_home_t:dir search_dir_perms; @@ -239364,7 +239438,7 @@ index 3c5dba7..0bb7b4d 100644 ') ######################################## -@@ -1744,10 +2207,12 @@ interface(`userdom_list_all_user_home_content',` +@@ -1744,10 +2208,12 @@ interface(`userdom_list_all_user_home_content',` # interface(`userdom_list_user_home_content',` gen_require(` @@ -239379,7 +239453,7 @@ index 3c5dba7..0bb7b4d 100644 ') ######################################## -@@ -1772,7 +2237,7 @@ interface(`userdom_manage_user_home_content_dirs',` +@@ -1772,7 +2238,7 @@ interface(`userdom_manage_user_home_content_dirs',` ######################################## ## @@ -239388,7 +239462,7 @@ index 3c5dba7..0bb7b4d 100644 ## ## ## -@@ -1780,19 +2245,17 @@ interface(`userdom_manage_user_home_content_dirs',` +@@ -1780,19 +2246,17 @@ interface(`userdom_manage_user_home_content_dirs',` ## ## # @@ -239412,7 +239486,7 @@ index 3c5dba7..0bb7b4d 100644 ## ## ## -@@ -1800,31 +2263,31 @@ interface(`userdom_delete_all_user_home_content_dirs',` +@@ -1800,31 +2264,31 @@ interface(`userdom_delete_all_user_home_content_dirs',` ## ## # @@ -239452,7 +239526,7 @@ index 3c5dba7..0bb7b4d 100644 ') ######################################## -@@ -1848,6 +2311,25 @@ interface(`userdom_dontaudit_setattr_user_home_content_files',` +@@ -1848,6 +2312,25 @@ interface(`userdom_dontaudit_setattr_user_home_content_files',` ######################################## ## @@ -239478,7 +239552,7 @@ index 3c5dba7..0bb7b4d 100644 ## Mmap user home files. ## ## -@@ -1878,14 +2360,36 @@ interface(`userdom_mmap_user_home_content_files',` +@@ -1878,14 +2361,36 @@ interface(`userdom_mmap_user_home_content_files',` interface(`userdom_read_user_home_content_files',` gen_require(` type user_home_dir_t, user_home_t; @@ -239516,7 +239590,7 @@ index 3c5dba7..0bb7b4d 100644 ## Do not audit attempts to read user home files. ## ## -@@ -1896,11 +2400,14 @@ interface(`userdom_read_user_home_content_files',` +@@ -1896,11 +2401,14 @@ interface(`userdom_read_user_home_content_files',` # interface(`userdom_dontaudit_read_user_home_content_files',` gen_require(` @@ -239534,7 +239608,7 @@ index 3c5dba7..0bb7b4d 100644 ') ######################################## -@@ -1941,7 +2448,25 @@ interface(`userdom_dontaudit_write_user_home_content_files',` +@@ -1941,7 +2449,25 @@ interface(`userdom_dontaudit_write_user_home_content_files',` ######################################## ## @@ -239561,7 +239635,7 @@ index 3c5dba7..0bb7b4d 100644 ## ## ## -@@ -1951,17 +2476,15 @@ interface(`userdom_dontaudit_write_user_home_content_files',` +@@ -1951,17 +2477,15 @@ interface(`userdom_dontaudit_write_user_home_content_files',` # interface(`userdom_delete_all_user_home_content_files',` gen_require(` @@ -239582,7 +239656,7 @@ index 3c5dba7..0bb7b4d 100644 ## ## ## -@@ -1969,12 +2492,48 @@ interface(`userdom_delete_all_user_home_content_files',` +@@ -1969,12 +2493,48 @@ interface(`userdom_delete_all_user_home_content_files',` ## ## # @@ -239633,7 +239707,7 @@ index 3c5dba7..0bb7b4d 100644 ') ######################################## -@@ -2010,8 +2569,7 @@ interface(`userdom_read_user_home_content_symlinks',` +@@ -2010,8 +2570,7 @@ interface(`userdom_read_user_home_content_symlinks',` type user_home_dir_t, user_home_t; ') @@ -239643,7 +239717,7 @@ index 3c5dba7..0bb7b4d 100644 ') ######################################## -@@ -2027,20 +2585,14 @@ interface(`userdom_read_user_home_content_symlinks',` +@@ -2027,20 +2586,14 @@ interface(`userdom_read_user_home_content_symlinks',` # interface(`userdom_exec_user_home_content_files',` gen_require(` @@ -239668,7 +239742,7 @@ index 3c5dba7..0bb7b4d 100644 ######################################## ## -@@ -2123,7 +2675,7 @@ interface(`userdom_manage_user_home_content_symlinks',` +@@ -2123,7 +2676,7 @@ interface(`userdom_manage_user_home_content_symlinks',` ######################################## ## @@ -239677,7 +239751,7 @@ index 3c5dba7..0bb7b4d 100644 ## ## ## -@@ -2131,19 +2683,17 @@ interface(`userdom_manage_user_home_content_symlinks',` +@@ -2131,19 +2684,17 @@ interface(`userdom_manage_user_home_content_symlinks',` ## ## # @@ -239701,7 +239775,7 @@ index 3c5dba7..0bb7b4d 100644 ## ## ## -@@ -2151,12 +2701,12 @@ interface(`userdom_delete_all_user_home_content_symlinks',` +@@ -2151,12 +2702,12 @@ interface(`userdom_delete_all_user_home_content_symlinks',` ## ## # @@ -239717,7 +239791,7 @@ index 3c5dba7..0bb7b4d 100644 ') ######################################## -@@ -2393,11 +2943,11 @@ interface(`userdom_dontaudit_manage_user_tmp_dirs',` +@@ -2393,11 +2944,11 @@ interface(`userdom_dontaudit_manage_user_tmp_dirs',` # interface(`userdom_read_user_tmp_files',` gen_require(` @@ -239732,7 +239806,7 @@ index 3c5dba7..0bb7b4d 100644 files_search_tmp($1) ') -@@ -2417,7 +2967,7 @@ interface(`userdom_dontaudit_read_user_tmp_files',` +@@ -2417,7 +2968,7 @@ interface(`userdom_dontaudit_read_user_tmp_files',` type user_tmp_t; ') @@ -239741,7 +239815,7 @@ index 3c5dba7..0bb7b4d 100644 ') ######################################## -@@ -2664,6 +3214,25 @@ interface(`userdom_tmp_filetrans_user_tmp',` +@@ -2664,6 +3215,25 @@ interface(`userdom_tmp_filetrans_user_tmp',` files_tmp_filetrans($1, user_tmp_t, $2, $3) ') @@ -239767,7 +239841,7 @@ index 3c5dba7..0bb7b4d 100644 ######################################## ## ## Read user tmpfs files. -@@ -2680,13 +3249,14 @@ interface(`userdom_read_user_tmpfs_files',` +@@ -2680,13 +3250,14 @@ interface(`userdom_read_user_tmpfs_files',` ') read_files_pattern($1, user_tmpfs_t, user_tmpfs_t) @@ -239783,7 +239857,7 @@ index 3c5dba7..0bb7b4d 100644 ## ## ## -@@ -2707,7 +3277,7 @@ interface(`userdom_rw_user_tmpfs_files',` +@@ -2707,7 +3278,7 @@ interface(`userdom_rw_user_tmpfs_files',` ######################################## ## @@ -239792,7 +239866,7 @@ index 3c5dba7..0bb7b4d 100644 ## ## ## -@@ -2715,19 +3285,17 @@ interface(`userdom_rw_user_tmpfs_files',` +@@ -2715,19 +3286,17 @@ interface(`userdom_rw_user_tmpfs_files',` ## ## # @@ -239815,7 +239889,7 @@ index 3c5dba7..0bb7b4d 100644 ## ## ## -@@ -2735,35 +3303,53 @@ interface(`userdom_manage_user_tmpfs_files',` +@@ -2735,35 +3304,53 @@ interface(`userdom_manage_user_tmpfs_files',` ## ## # @@ -239877,7 +239951,7 @@ index 3c5dba7..0bb7b4d 100644 ## ## ## -@@ -2817,6 +3403,24 @@ interface(`userdom_use_user_ttys',` +@@ -2817,6 +3404,24 @@ interface(`userdom_use_user_ttys',` ######################################## ## @@ -239902,7 +239976,7 @@ index 3c5dba7..0bb7b4d 100644 ## Read and write a user domain pty. ## ## -@@ -2835,22 +3439,34 @@ interface(`userdom_use_user_ptys',` +@@ -2835,22 +3440,34 @@ interface(`userdom_use_user_ptys',` ######################################## ## @@ -239945,7 +240019,7 @@ index 3c5dba7..0bb7b4d 100644 ## ## ## -@@ -2859,14 +3475,33 @@ interface(`userdom_use_user_ptys',` +@@ -2859,14 +3476,33 @@ interface(`userdom_use_user_ptys',` ## ## # @@ -239983,7 +240057,7 @@ index 3c5dba7..0bb7b4d 100644 ') ######################################## -@@ -2885,8 +3520,27 @@ interface(`userdom_dontaudit_use_user_terminals',` +@@ -2885,8 +3521,27 @@ interface(`userdom_dontaudit_use_user_terminals',` type user_tty_device_t, user_devpts_t; ') @@ -240013,7 +240087,7 @@ index 3c5dba7..0bb7b4d 100644 ') ######################################## -@@ -2958,69 +3612,68 @@ interface(`userdom_spec_domtrans_unpriv_users',` +@@ -2958,69 +3613,68 @@ interface(`userdom_spec_domtrans_unpriv_users',` allow unpriv_userdomain $1:process sigchld; ') @@ -240114,7 +240188,7 @@ index 3c5dba7..0bb7b4d 100644 ## ## ## -@@ -3028,12 +3681,12 @@ interface(`userdom_manage_unpriv_user_semaphores',` +@@ -3028,12 +3682,12 @@ interface(`userdom_manage_unpriv_user_semaphores',` ## ## # @@ -240129,7 +240203,7 @@ index 3c5dba7..0bb7b4d 100644 ') ######################################## -@@ -3097,7 +3750,7 @@ interface(`userdom_entry_spec_domtrans_unpriv_users',` +@@ -3097,7 +3751,7 @@ interface(`userdom_entry_spec_domtrans_unpriv_users',` domain_entry_file_spec_domtrans($1, unpriv_userdomain) allow unpriv_userdomain $1:fd use; @@ -240138,7 +240212,7 @@ index 3c5dba7..0bb7b4d 100644 allow unpriv_userdomain $1:process sigchld; ') -@@ -3113,29 +3766,13 @@ interface(`userdom_entry_spec_domtrans_unpriv_users',` +@@ -3113,29 +3767,13 @@ interface(`userdom_entry_spec_domtrans_unpriv_users',` # interface(`userdom_search_user_home_content',` gen_require(` @@ -240172,7 +240246,7 @@ index 3c5dba7..0bb7b4d 100644 ') ######################################## -@@ -3217,7 +3854,7 @@ interface(`userdom_dontaudit_use_user_ptys',` +@@ -3217,7 +3855,7 @@ interface(`userdom_dontaudit_use_user_ptys',` type user_devpts_t; ') @@ -240181,7 +240255,7 @@ index 3c5dba7..0bb7b4d 100644 ') ######################################## -@@ -3272,7 +3909,64 @@ interface(`userdom_write_user_tmp_files',` +@@ -3272,7 +3910,64 @@ interface(`userdom_write_user_tmp_files',` type user_tmp_t; ') @@ -240247,7 +240321,7 @@ index 3c5dba7..0bb7b4d 100644 ') ######################################## -@@ -3290,7 +3984,7 @@ interface(`userdom_dontaudit_use_user_ttys',` +@@ -3290,7 +3985,7 @@ interface(`userdom_dontaudit_use_user_ttys',` type user_tty_device_t; ') @@ -240256,7 +240330,7 @@ index 3c5dba7..0bb7b4d 100644 ') ######################################## -@@ -3309,6 +4003,7 @@ interface(`userdom_read_all_users_state',` +@@ -3309,6 +4004,7 @@ interface(`userdom_read_all_users_state',` ') read_files_pattern($1, userdomain, userdomain) @@ -240264,7 +240338,7 @@ index 3c5dba7..0bb7b4d 100644 kernel_search_proc($1) ') -@@ -3385,6 +4080,42 @@ interface(`userdom_signal_all_users',` +@@ -3385,6 +4081,42 @@ interface(`userdom_signal_all_users',` allow $1 userdomain:process signal; ') @@ -240307,7 +240381,7 @@ index 3c5dba7..0bb7b4d 100644 ######################################## ## ## Send a SIGCHLD signal to all user domains. -@@ -3405,6 +4136,24 @@ interface(`userdom_sigchld_all_users',` +@@ -3405,6 +4137,24 @@ interface(`userdom_sigchld_all_users',` ######################################## ## @@ -240332,7 +240406,7 @@ index 3c5dba7..0bb7b4d 100644 ## Create keys for all user domains. ## ## -@@ -3439,3 +4188,1365 @@ interface(`userdom_dbus_send_all_users',` +@@ -3439,3 +4189,1365 @@ interface(`userdom_dbus_send_all_users',` allow $1 userdomain:dbus send_msg; ') diff --git a/policy-rawhide-contrib.patch b/policy-rawhide-contrib.patch index 99f1306..972f2b9 100644 --- a/policy-rawhide-contrib.patch +++ b/policy-rawhide-contrib.patch @@ -31146,10 +31146,10 @@ index 73e2803..562d25b 100644 files_search_pids($1) admin_pattern($1, l2tpd_var_run_t) diff --git a/l2tp.te b/l2tp.te -index 19f2b97..134b150 100644 +index 19f2b97..17f1883 100644 --- a/l2tp.te +++ b/l2tp.te -@@ -75,16 +75,12 @@ corecmd_exec_bin(l2tpd_t) +@@ -75,19 +75,19 @@ corecmd_exec_bin(l2tpd_t) dev_read_urand(l2tpd_t) @@ -31166,6 +31166,13 @@ index 19f2b97..134b150 100644 sysnet_dns_name_resolve(l2tpd_t) optional_policy(` ++ networkmanager_read_pid_files(l2tpd_t) ++') ++ ++optional_policy(` + ppp_domtrans(l2tpd_t) + ppp_signal(l2tpd_t) + ppp_kill(l2tpd_t) diff --git a/ldap.fc b/ldap.fc index bc25c95..dcdbe9b 100644 --- a/ldap.fc @@ -35097,10 +35104,10 @@ index 4462c0e..84944d1 100644 userdom_dontaudit_use_unpriv_user_fds(monopd_t) diff --git a/mozilla.fc b/mozilla.fc -index 6ffaba2..4cecf11 100644 +index 6ffaba2..ce28024 100644 --- a/mozilla.fc +++ b/mozilla.fc -@@ -1,38 +1,59 @@ +@@ -1,38 +1,60 @@ -HOME_DIR/\.galeon(/.*)? gen_context(system_u:object_r:mozilla_home_t,s0) -HOME_DIR/\.mozilla(/.*)? gen_context(system_u:object_r:mozilla_home_t,s0) -HOME_DIR/\.mozilla/plugins(/.*)? gen_context(system_u:object_r:mozilla_plugin_home_t,s0) @@ -35129,7 +35136,8 @@ index 6ffaba2..4cecf11 100644 +HOME_DIR/\.adobe(/.*)? gen_context(system_u:object_r:mozilla_home_t,s0) +HOME_DIR/\.macromedia(/.*)? gen_context(system_u:object_r:mozilla_home_t,s0) +HOME_DIR/\.gnash(/.*)? gen_context(system_u:object_r:mozilla_home_t,s0) -+HOME_DIR/\.gcjwebplugin(/.*)? gen_context(system_u:object_r:mozilla_home_t,s0) ++HOME_DIR/\.gcjwebplugin(/.*)? gen_context(system_u:object_r:mozilla_home_t,s0) ++HOME_DIR/\.grl-podcasts(/.*)? gen_context(system_u:object_r:mozilla_home_t,s0) +HOME_DIR/\.icedteaplugin(/.*)? gen_context(system_u:object_r:mozilla_home_t,s0) +HOME_DIR/\.lyx(/.*)? gen_context(system_u:object_r:mozilla_home_t,s0) +HOME_DIR/\.quakelive(/.*)? gen_context(system_u:object_r:mozilla_home_t,s0) @@ -35195,7 +35203,7 @@ index 6ffaba2..4cecf11 100644 +/usr/lib/nspluginwrapper/plugin-config -- gen_context(system_u:object_r:mozilla_plugin_config_exec_t,s0) +') diff --git a/mozilla.if b/mozilla.if -index 6194b80..84438b1 100644 +index 6194b80..60bb004 100644 --- a/mozilla.if +++ b/mozilla.if @@ -1,146 +1,75 @@ @@ -35816,7 +35824,7 @@ index 6194b80..84438b1 100644 ## ## ## -@@ -530,45 +430,46 @@ interface(`mozilla_plugin_delete_tmpfs_files',` +@@ -530,45 +430,47 @@ interface(`mozilla_plugin_delete_tmpfs_files',` ## ## # @@ -35878,6 +35886,7 @@ index 6194b80..84438b1 100644 + userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".adobe") + userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".macromedia") + userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".gnash") ++ userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".grl-podcasts") + userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".gcjwebplugin") + userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".icedteaplugin") + userdom_user_home_dir_filetrans($1, mozilla_home_t, dir, ".quakelive") @@ -67032,7 +67041,7 @@ index f1140ef..6bde558 100644 - rsync_run($1, $2) -') diff --git a/rsync.te b/rsync.te -index e3e7c96..f3932af 100644 +index e3e7c96..ad3e416 100644 --- a/rsync.te +++ b/rsync.te @@ -1,4 +1,4 @@ @@ -67136,7 +67145,7 @@ index e3e7c96..f3932af 100644 files_type(rsync_data_t) type rsync_log_t; -@@ -86,15 +79,22 @@ files_pid_file(rsync_var_run_t) +@@ -86,15 +79,23 @@ files_pid_file(rsync_var_run_t) allow rsync_t self:capability { chown dac_read_search dac_override fowner fsetid setuid setgid sys_chroot }; allow rsync_t self:process signal_perms; allow rsync_t self:fifo_file rw_fifo_file_perms; @@ -67158,13 +67167,14 @@ index e3e7c96..f3932af 100644 -allow rsync_t rsync_data_t:lnk_file read_lnk_file_perms; +read_files_pattern(rsync_t, rsync_data_t, rsync_data_t) +read_lnk_files_pattern(rsync_t, rsync_data_t, rsync_data_t) ++allow rsync_t rsync_data_t:dir_file_class_set getattr; -allow rsync_t rsync_log_t:file { append_file_perms create_file_perms setattr_file_perms }; +manage_files_pattern(rsync_t, rsync_log_t, rsync_log_t) logging_log_filetrans(rsync_t, rsync_log_t, file) manage_dirs_pattern(rsync_t, rsync_tmp_t, rsync_tmp_t) -@@ -108,91 +108,76 @@ kernel_read_kernel_sysctls(rsync_t) +@@ -108,91 +109,76 @@ kernel_read_kernel_sysctls(rsync_t) kernel_read_system_state(rsync_t) kernel_read_network_state(rsync_t) diff --git a/selinux-policy.spec b/selinux-policy.spec index e73d261..6a0ecae 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -19,7 +19,7 @@ Summary: SELinux policy configuration Name: selinux-policy Version: 3.12.1 -Release: 7%{?dist} +Release: 8%{?dist} License: GPLv2+ Group: System Environment/Base Source: serefpolicy-%{version}.tgz @@ -524,6 +524,16 @@ SELinux Reference policy mls base module. %endif %changelog +* Mon Jan 28 2013 Miroslav Grepl 3.12.1-8 +- Change ssh_use_pts to use macro and only inherited sshd_devpts_t +- Allow confined users to read systemd_logind seat information +- libmpg ships badly created libraries +- Add support for strongswan.service +- Add labeling for strongswan +- Allow l2tpd_t to read network manager content in /run directory +- Allow rsync to getattr any file in rsync_data_t +- Add labeling and filename transition for .grl-podcasts + * Fri Jan 25 2013 Miroslav Grepl 3.12.1-7 - mount.glusterfs executes glusterfsd binary - Allow systemd_hostnamed_t to stream connect to systemd